Security Operations

Understand the new challenges of security operations, from technological advancements to methods and organizational structures.

Filter by:

XDR: Going further with MDR

As powerful and popular as it is, Endpoint Detection and Response (EDR) has its limits, even if you entrust its management to a specialist. As the name suggests, the EDR focuses on endpoints and detects…
20 May, 2025 min

Introduction to responsible AI

20 May, 2025 min

Ransomware attack: our CERT’s response in detail

20 May, 2025 min

Overview of the MITRE ATT&CK framework

20 May, 2025 min

With CSPM, a light on cloud security

19 May, 2025 min
https://www.cyberun.net/

Looking past the hype: the reality of automation in operational cyber security

19 May, 2025 min
The Endpoint Detection & Response (EDR) is becoming essential for the protection of endpoints (whether on desktops, servers, mobiles or tablets) against threats and cyber-attacks. But how can we make sure that we make the best use of this powerful solution that provides a large volume of information?

EDR-as-a-Service, to increase the power of EDR

19 May, 2025 min

aDvens positioned as a Leader in the ISG Provider Lens™

19 May, 2025 min

OT Cybersecurity: An Overview of the Risks

12 May, 2023 min
How can we protect ourselves from cyber attacks in an industrial setting? What are the constraints and solutions to counter them?

Industrial cyber security: why should you protect yourself?

11 May, 2023 min